Startseite UB

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 99.

Article

Bourimi, Mohamed and Kesdogan, Dogan and Heupel, Marcel and Abou-Tair, Dhiah el Diehn I. and Lambropoulos, Niki (2013) PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education. Journal of Universal Computer Science. (In Press)

Karatas, Fatih and Barth, Thomas and Kesdogan, Dogan and Fardoun, Habib M. and Villanueva, Pedro G. (2013) Uso de interface distribuída para avaliar a tomada de decisão na nuvem. RTI Magzine (Sao Paulo, Brazil) (1/2013), pp. 82-89.

Abou-Tair, Dhiah el Diehn I. and Bourimi, Mohamed and Barth, Thomas and Kesdogan, Dogan and Hermann, Fabian (2012) Using Distributed User Interfaces in Collaborative, Secure, and Privacy-Preserving Software Environments. International Journal of Human-Computer Interaction 28, pp. 748-753.

Bourimi, Mohamed and Haake, J. M. and Heupel, Marcel and Ueberschär, Bernd and Kesdogan, Dogan and Barth, Thomas (2010) Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture. International Journal for Infonomics 3 (4), pp. 563-572.

Kesdogan, Dogan and Palmer, C. (2006) Technical challenges of network anonymity. Computer Communications 29 (3), pp. 306-324.

Agrawal, Dakshi and Kesdogan, Dogan (2003) Measuring Anonymity: The Disclosure Attack. IEEE security & privacy 1 (6), pp. 27-34.

Borning, Mark and Kesdogan, Dogan and Spaniol, Otto (2001) Anonymität und Unbeobachtbarkeit im Internet (= Anonymity and unobservability in the Internet). Information technology : it 43 (4), pp. 254-263.

Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas and Spaniol, Otto (1996) Mobilkommunikation ohne Bewegungsprofile. Informationstechnik und technische Informatik: it + ti 38 (4), pp. 24-29.

Bertsch, Andreas and Damker, Herbert and Federrath, Hannes and Kesdogan, Dogan and Schneider, Michael (1995) Erreichbarkeitsmanagement. Praxis der Informationsverarbeitung und Kommunikation: PIK 18 (3), pp. 231-234.

Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas (1995) Technischer Datenschutz in öffentlichen Mobilkommunikationsnetzen. Wissenschaftliche Zeitschrift der TU Dresden 44 (6), pp. 4-9.

Book Section

Karatas, Fatih and Kesdogan, Dogan (2013) A Flexible Approach For Considering Interdependent Security Objectives in Service Composition. In: Proceedings of the ACM Symposium on Applied Computing, (2013 05 27). ACM Digital Library, pp. 1919-1926. ISBN 9781450316569.

Karatas, Fatih and Heupel, Marcel and Bourimi, Mohamed and Kesdogan, Dogan and Wrobel, Sophie (2013) Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case Study. In: Proc. of: 10th International Conference on Information Technology : New Generations (ITNG 2013). IEEE. (In Press)

Bourimi, Mohamed and Kesdogan, Dogan (2013) Experiences by using AFFINE for building collaborative applications for online communities. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press)

Schwarte, Philipp and Bourimi, Mohamed and Heupel, Marcel and Kesdogan, Dogan and Gimenez, Rafa and Wrobel, Sophie and Thiel, Simon (2013) Multilaterally secure communication anonymity in decentralized social networking. In: Proc. of: 10th International Conference on Information Technology : New Generations (ITNG 2013). IEEE. (In Press)

Heupel, Marcel and Bourimi, Mohamed and Scerri, Simon and Kesdogan, Dogan (2013) Privacy-preserving concepts for supporting recommendations in decentralized OSNs. In: MSM '13 Proceedings of the 4th International Workshop on Modeling Social Media. ACM, New York. ISBN 978-1-4503-2007-8.

Karatas, Fatih and Bourimi, Mohamed and Kesdogan, Dogan (2013) Towards Visual Configuration Support For Interdependent Security Goals. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press)

Heupel, Marcel and Bourimi, Mohamed and Kesdogan, Dogan (2013) Trust and Privacy in The di.me Userware. In: Proceedings of the 15th International Conference on Human-Computer Interaction (HCI International). Springer, Berlin. (In Press)

Abou-Tair, Dhiah el Diehn I. and Bourimi, Mohamed and Tesoriero, Ricardo and Kesdogan, Dogan and Heupel, Marcel (2012) A generic location-based mobile application framework supporting privacy-preserving end-user tailorability. In: Proceedings of: IGCT 2012. International Conference on Future Generation Communication Technologies. IEEE, pp. 202-207. ISBN 978-1-4673-5859-0.

Heupel, Marcel and Fischer, Lars and Bourimi, Mohamed and Kesdogan, Dogan and Scerri, Simon and Hermann, Fabian and Gimenez, Rafael (2012) Context-Aware, Trust-Based Access Control for the di.me Userware. In: 5th International Conference on New Technologies, Mobility and Security (NTMS), Istanbul, 7-10 May 2012. IEEE, pp. 1-6. ISBN 978-1-4673-0228-9, 978-1-4673-0227-2 (online).

Fischer, Lars and Heupel, Marcel and Bourimi, Mohamed and Kesdogan, Dogan and Gimenez, Rafael (2012) Enhancing privacy in collaborative scenarios utilising a flexible proxy layer. In: 2012 International Conference on Future Generation Communication Technology (FGCT), London, 12-14 Dec. 2012. IEEE, pp. 126-132. ISBN 978-1-4673-5859-0.

Heupel, Marcel and Bourimi, Mohamed and Kesdogan, Dogan and Barth, Thomas and Schwarte, Philipp and Villanueva, Pedro G. (2012) Enhancing the security and usability of DUI based collaboration with proof based access control. In: Tesoriero, Ricardo, (ed.) Proc. of the 2nd Workshop on Distributed User Interfaces: DUI 2012, in conjunction with 2012 CHI conf. ISE Research Group, University of Castilla-La Mancha, Spain, pp. 23-26. ISBN 84-695-3318-5.

Stegelmann, Mark and Kesdogan, Dogan (2012) GridPriv: A Smart Metering Architecture Offering k-Anonymity. In: 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, 25-27 June 2012. IEEE, pp. 419-426. ISBN 978-1-4673-2172-3.

Stegelmann, Mark and Kesdogan, Dogan (2012) Location Privacy for Vehicle-to-Grid Interaction through Battery Management. In: Ninth International Conference on Information Technology: New Generations (ITNG 2012) : Las Vegas, Nevada, USA, 16 - 18 April 2012. IEEE, Piscataway, NJ, pp. 373-378. ISBN 978-1-467-30798-7, 978-0-7695-4654-4.

Westermann, B. and Kesdogan, Dogan (2012) Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: Financial Cryptography and Data Security. 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science, 7035. Springer, Berlin, pp. 62-76. ISBN 978-3-642-27575-3; 978-3-642-27576-0 (online).

Bourimi, Mohamed and Heupel, Marcel and Westermann, B. and Kesdogan, Dogan and Gimenez, Rafa and Planaguma, M. and Karatas, F. and Schwarte, F. (2012) Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios. In: Ninth International Conference on Information Technology: New Generations (ITNG 2012) : Las Vegas, Nevada, USA, 16 - 18 April 2012. IEEE, Piscataway, NJ, pp. 102-108. ISBN 978-1-467-30798-7, 978-0-7695-4654-4.

Heupel, Marcel and Kesdogan, Dogan (2012) Towards Usable Interfaces for Proof Based Access Rights on Mobile Devices. In: Camenisch, Jan and Kesdogan, Dogan, (eds.) Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers. Lecture Notes in Computer Science, 1039. Springer, Berlin, pp. 15-27. ISBN 978-3-642-27584-5;978-3-642-27585-2 (online).

Karatas, Fatih and Bourimi, Mohamed and Barth, Thomas and Kesdogan, Dogan and Gimenez, Rafael and Schwittek, Widura and Planaguma, Marc (2012) Towards secure and at-runtime tailorable customer-driven public cloud deployment. In: International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Lugano, 19-23 March 2012. IEEE, pp. 124-130. ISBN 978-1-4673-0905-9 , 978-1-4673-0906-6 (online).

Karatas, Fatih and Barth, Thomas and Kesdogan, Dogan and Fardoun, Habib M. and Villanueva, Pedro G. (2012) Using Distributed User Interfaces to Evaluate Decision Making in Cloud Deployment. In: Tesoriero, Ricardo, (ed.) Proc. of the 2nd Workshop on Distributed User Interfaces: DUI 2012, in conjunction with 2012 CHI conf. ISE Research Group, University of Castilla-La Mancha, Spain, pp. 17-22. ISBN 84-695-3318-5.

Vinh Pham, Dang and Wright, Joss and Kesdogan, Dogan (2011) A Practical Complexity-Theoretic Analysis of Mix Systems. In: Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings. Lecture Notes in Computer Science, 6879. Springer, Berlin, pp. 508-527. ISBN 978-3-642-23821-5;978-3-642-23822-2 (online).

Bourimi, Mohamed and Mau, G. and Steinmann, S. and Klein, D. and Templin, S. and Kesdogan, Dogan and Schramm-Klein, H. (2011) A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile Devices. In: Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, 11-13 April 2011. IEEE, pp. 139-144. ISBN 978-1-61284-427-5, 978-0-7695-4367-3 (online).

Barth, Thomas and Fielenbach, Thomas and Bourimi, Mohamed and Kesdogan, Dogan and Villanueva, Pedro G. (2011) Supporting Distributed Decision Making Using Secure Distributed User Interfaces. In: Gallud, José A., (ed.) Distributed User Interfaces : Designing Interfaces for the Distributed Ecosystem. Human-Computer Interaction Series. Springer London, London, pp. 177-184. ISBN 978-1-447-12270-8, 978-1-4471-2271-5 (Online).

Bourimi, Mohamed and Barth, Thomas and Haake, J. M. and Ueberschär, Bernd and Kesdogan, Dogan (2010) AFFINE for Enforcing Earlier Consideration of NFRs and Human Factors When Building Socio-Technical Systems Following Agile Methodologies. In: Human-Centred Software Engineering. Third International Conference, HCSE 2010, Reykjavik, Iceland, October 14-15, 2010. Proceedings. Lecture Notes in Computer Science, 6409. Springer, Berlin, pp. 182-189. ISBN 978-3-642-16487-3; 978-3-642-16488-0 (online).

Bourimi, Mohamed and Ueberschär, Bernd and Ganglbauer, E. and Kesdogan, Dogan and Barth, Thomas and Dax, J. and Heupel, Marcel (2010) Building usable and privacy-preserving mobile collaborative applications for real-life communities: A case study based report. In: International Conference on Information Society (i-Society), London, 28-30 June 2010. IEEE. ISBN 978-1-4577-1823-6 ; 978-0-9564263-3-8 (online).

Westermann, Benedikt and Wendolsky, R. and Pimenidis, L. and Kesdogan, Dogan (2010) Cryptographic Protocol Analysis of AN.ON. In: Financial Cryptography and Data Security. 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science, 6052. Springer, Berlin, pp. 114-128. ISBN 978-3-642-14576-6; 978-3-642-14577-3 (online).

Dax, J. and Heupel, Marcel and Bourimi, Mohamed and Kesdogan, Dogan (2010) Eine datenschutzfreundliche, ortsbezogene Groupware für das iPhone. In: Sichere Mobilität und Dienstnutzung in künftigen Netzen. 4 . Essener Workshop „ Neue Herausforderungen in der Netzsicherheit “, 15. /16. April 2010. Abstracts. Univ. Duisburg-Essen , pp. 22-23.

Bourimi, Mohamed and Kesdogan, Dogan and Barth, Thomas and Höfke, K. and Abou-Tair, Dhiah el Diehn I. (2010) Evaluating potentials of Internet- and Web-based SocialTV in the light of privacy. In: IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, MN, 20-22 Aug. 2010. IEEE. ISBN 978-1-4244-8439-3; 978-0-7695-4211-9 (online).

Westermann, Benedikt and Kesdogan, Dogan (2010) Introducing Perfect Forward Secrecy for AN.ON. In: Networked Services and Applications - Engineering, Control and Management. 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings. Lecture Notes in Computer Science, 6164. Springer, Berlin, pp. 132-142. ISBN 978-3-642-13970-3; 978-3-642-13971-0 (online).

Pham, Dang Vinh and Kesdogan, Dogan (2009) A Combinatorial Approach for an Anonymity Metric. In: Information Security and Privacy. 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Lecture Notes in Computer Science, 5594. Springer, Berlin, pp. 26-43. ISBN 978-3-642-02619-5, 978-3-642-02620-1 (online).

Pham, Dang Vinh and Wright, Joss (2009) Discussing Anonymity Metrics for Mix Based Anonymity Approaches. In: Camenisch, Jan and Kesdogan, Dogan, (eds.) iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology, 309. Springer, Berlin, pp. 149-168. ISBN 978-3-642-05436-5 (Print), 978-3-642-05437-2 (Online).

Pham, Dang Vinh and Wright, Joss (2009) Discussing Anonymity Metrics for Mix Based Anonymity Approaches. In: Camenisch, Jan and Kesdogan, Dogan, (eds.) iNetSec 2009 — Open Research Problems in Network Security. IFIP Advances in Information and Communication Technology, 309. Springer, Berlin, 149 - 168. ISBN 978-3-642-05437-2 (online), 978-3-642-05436-5 (print).

Bourimi, Mohamed and Kühnel, Falk and Haake, J. M. and Abou-Tair, Dhiah el Diehn I. and Kesdogan, Dogan (2009) Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems. In: Groupware: Design, Implementation, and Use: 15th International Workshop, CRIWG 2009, Peso da Régua, Douro, Portugal, September 13-17, 2009. Proceedings. Lecture Notes in Computer Science, 5784. Springer, Berlin, pp. 100-125. ISBN 978-3-642-04215-7; 978-3-642-04216-4 (online).

Bourimi, Mohamed and Barth, Thomas and Ueberschär, Bernd and Kesdogan, Dogan (2009) Towards Building User-Centric Privacy-Respecting Collaborative Applications. In: Intelligent Interactive Assistance and Mobile Multimedia Computing: International Conference, IMC 2009, Rostock-Warnemünde, Germany, November 9-11, 2009. Proceedings. Communications in Computer and Information Science, 53. Springer, Berlin, pp. 341-342. ISBN 978-3-642-10262-2; 978-3-642-10263-9 (online).

Pham, Dang Vinh and Kesdogan, Dogan and Pimenidis, Lexi (2008) Analyse der Verkettbarkeit in nutzergesteuerten Identititätsmanagementsystemen. In: Alkassar, Ammar, (ed.) Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ; 2. - 4. April 2008 im Saarbrücker Schloss. GI-Edition : Proceedings LNI, 128. Ges. f. Informatik, Bonn, 17 - 30. ISBN 978-3-88579-222-2.

Kesdogan, Dogan and Pham, Vinh and Pimenidis, L. (2007) Information Disclosure in Identity Management. In: Proceedings of 12th Nordic Workshop on Secure IT-Systems, Reykjavik, Iceland, 11-12 October 2007. UNSPECIFIED.

Kesdogan, Dogan and Agrawal, Dakshi and Pham, Vinh and Rautenbach, Dieter (2006) Fundamental limits on the anonymity provided by the MIX technique. In: Symposium on Security and Privacy, 21-24 May 2006, Berkeley/Oakland, CA, USA. IEEE, pp. 14-99. ISBN 0-7695-2574-1.

Clauß, Sebastian and Kesdogan, Dogan and Kölsch, Tobias and Pimenidis, L. and Schiffner, Stefan and Steinbrecher, Sandra (2006) Identitätsmanagement und das Risiko der Re-Identifikation. In: Dittmann, Jana, (ed.) Sicherheit 2006 : Otto-von-Guericke-Univ, Magdeburg, 20. - 22. Feb. 2006. GI-Edition : Proceedings, 77. Ges. f. Informatik, Bonn, pp. 188-191. ISBN 3-88579-171-4.

Kesdogan, Dogan and Kölsch, Tobias and Pimenidis, Lexi (2006) Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis. In: Quality of Protection. Security Measurements and Metrics. Advances in Information Security, 23. Springer, Berlin, pp. 159-171. ISBN 978-0-387-29016-4, 978-0-387-36584-8 (online).

Benenson, Zinaida and Freiling, Felix C. and Holz, Thorsten and Kesdogan, Dogan and Draque Penso, Lucia (2006) Safety, Liveness, and Information Flow: Dependability Revisited. In: ARCS '06, 19th International Conference on Architecture of Computing Systems : March 16, 2006, Frankfurt am Main. Workshop proceedings. GI-Edition : Proceedings, 81. Ges. f. Informatik, Bonn, pp. 56-65. ISBN 3-88579-175-7.

Kesdogan, Dogan and Pimenidis, Lexi (2006) The Lower Bound of Attacks on Anonymity Systems — A Unicity Distance Approach. In: Quality of Protection. Security Measurements and Metrics. Advances in Information Security, 23. Springer, Berlin, pp. 145-158. ISBN 978-0-387-29016-4, 978-0-387-36584-8 (online).

Fort, Milan and Freiling, Felix and Draque Penso, Lucia and Benenson, Zinaida and Kesdogan, Dogan (2006) TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. In: Computer Security – ESORICS 2006. 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings. Lecture Notes in Computer Science, 4189. Springer, Berlin, pp. 34-48. ISBN 978-3-540-44601-9, 978-3-540-44605-7 (online).

Benenson, Zinaida and Gärtner, Felix and Kesdogan, Dogan (2005) An Algorithmic Framework for Robust Access Control in Wireless Sensor Networks. In: Proceeedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN 2005). IEEE, pp. 158-165. ISBN 0-7803-8801-1 (print).

Fritsch, Lothar and Kölsch, Tobias and Kohlweiss, Markulf and Kesdogan, Dogan (2005) Mit IDM und Mittler zu mehr Privatsphäre in LBS. In: Roth, Jörg, (ed.) Ortsbezogene Anwendungen und Dienste : 2. GI/ITG KuVS Fachgespräch, Stuttgart 2005.06.16-17. Informatik-Berichte, 324. FernUniversität, Fachbereich Informatik, Hagen, pp. 58-62.

Clauß, Sebastian and Kesdogan, Dogan and Kölsch, Tobias and Pimenidis, L. and Schiffner, Stefan and Steinbrecher, Sandra (2005) Privacy Enhanced Identity Management: Design Considerations and Open Problems. In: DIM '05. Proceedings of the 2005 ACM Workshop on Digital Identity Management, Nov. 11, George Mason University, Fairfax, VA, USA. ACM, New York, pp. 84-93. ISBN 1595932321 (online).

Kölsch, Tobias and Fritsch, Lothar and Kohlweiss, Markulf and Kesdogan, Dogan (2005) Privacy for Profitable Location Based Services. In: Security in Pervasive Computing. 2nd Internat. Conf., SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings. Lecture Notes in Computer Science, 3450. Springer, Berlin, pp. 164-178. ISBN 978-3-540-25521-5, 978-3-540-32004-3 (online).

Benenson, Zinaida and Gärtner, Felix and Kesdogan, Dogan (2005) Secure Multi-Party Computation with Security Modules. In: Federrath, Hannes, (ed.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Lecture Notes in Informatics P, P-62. Köllen, Bonn. ISBN 3-88579-391-1.

Kesdogan, Dogan and Rattay, O. (2005) Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web (= Security Evaluation of Anonymity Techniques). In: Federrath, Hannes, (ed.) Sicherheit 2005: Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5.-8. April 2005 in Regensburg. Lecture Notes in Informatics P, P-62. Köllen, Bonn. ISBN 3-88579-391-1.

Kesdogan, Dogan and Pimenidis, Lexi (2005) The Hitting Set Attack on Anonymity Protocols. In: Information Hiding. 6th Internat. Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers. Lecture Notes in Computer Science, 3200. Springer, Berlin, pp. 326-339. ISBN 978-3-540-24207-9, 978-3-540-30114-1 (online).

Benenson, Zinaida and Gärtner, Felix and Kesdogan, Dogan (2004) User Authentication in Sensor Networks (extended abstract). In: Daman, Peter, (ed.) Informatik 2004 : Informatik verbindet : Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Ulm, 20. - 24. September 2004. GI-Edition: Lecture notes in informatics (LNI). Proceedings, 50-51. Ges. f. Informatik, Bonn. ISBN 3885793792 (2 Bände).

Kesdogan, Dogan and Agrawal, Dakshi and Penz, Stefan (2003) Limits of Anonymity in Open Environments. In: Information Hiding. 5th Internat. Workshop, IH 2002 Noordwijkerhout, The Netherlands, Oct. 7-9, 2002 Revised Papers. Lecture Notes in Computer Science, 2578. Springer, Berlin, pp. 53-69. ISBN 978-3-540-00421-9, 978-3-540-36415-3 (online).

Agrawal, Dakshi and Kesdogan, Dogan and Penz, Stefan (2003) Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: SP '03 : Proceedings of the 2003 IEEE Symposium on Security and Privacy, 11-14 May 2003, Oakland, CA, USA. IEEE CS Press, Washington, DC, pp. 16-27. ISBN 0-7695-1940-7.

Kesdogan, Dogan and Borning, Max and Schmeink, Michael (2003) Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach? In: Privacy Enhancing Technologies : 2nd Internat. Worksh., PET 2002, San Francisco, CA, USA, April 14–15, 2002. Revised Papers. Lecture Notes in Computer Science, 2482. Springer, Berlin, pp. 224-238. ISBN 978-3-540-00565-0, 978-3-540-36467-2 (online).

Kesdogan, Dogan and Borning, Mark and Schmeink, Michael (2001) Die Blinded-Read-Methode zum unbeobachtbaren Surfen im WWW (=Anonymous Surfing on the World Wide Web). In: Verlässliche IT-Systeme : Sicherheit in komplexen IT-Infrastrukturen. Vieweg, Wiesbaden, pp. 37-54. ISBN 3-528-05782-3.

Boursas, Latifa and Bourimi, Mohamed and Hommel, Wolfgang and Kesdogan, Dogan (2001) Enhancing Trust in SOA Based Collaborative Environments. In: Systems and Virtualization Management. Standards and the Cloud Third International DMTF Academic Alliance Workshop, SVM 2009, Wuhan, China, September 22-23, 2009. Revised Selected Papers. Communications in Computer and Information Science, 71. Springer, Berlin, pp. 94-102. ISBN 978-3-642-14943-6; 978-3-642-14944-3 (online).

Kesdogan, Dogan (2001) Evaluation of Anonymity Providing Techniques using Queuning Theory. In: Proceedings / LCN 2001, 26th Annual IEEE Conference on Local Computer Networks : 14 - 16 November 2001, Tampa, Florida. IEEE CS Press, Los Alamitos, Calif.. ISBN 0-7695-1321-2.

Bohrer, Kathy and Liu, Xuan and Kesdogan, Dogan and Schonberg, Edith and Singh, Muninder (2001) How to go Shopping on the World Wide Web without having your Privacy Violated. In: 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA, pp. 529-240. ISBN 0971625301 (beide Bände).

Bohrer, Kathy and Liu, Xuan and Kesdogan, Dogan and Schonberg, Edith and Singh, Moninder and Spraragen, Susan L. (2001) Personal Information Management and Distribution. In: 4th Int. Conf. on Electronic Commerce Research (ICECR-4), Dallas, TX, USA, Nov. 8-11, 2001. Southern Methodist Univ., Dallas, TX, USA. ISBN 0971625301 (beide Bände).

Kesdogan, Dogan and Schäffter, M. (2000) Übersicht und Bewertung von VPN-Produktlösungen (=Overview and Evaluation of VPN Solutions). In: 7. Workshop Sicherheit in Vernetzten Systemen : 8. und 9. März 2000, Hamburg ( DFN-CERT). DFN-Bericht, 90. Verein zur Förderung eines Deutschen Forschungsnetzes, Berlin.

Kesdogan, Dogan and Büschkes, Roland (1999) Klassifizierung von Anonymisierungstechniken (= Classification of Anonymization Techniques). In: Sicherheitsinfrastrukturen : Grundlagen, Realisierungen, rechtliche Aspekte, Anwendungen. Vieweg, Braunschweig, pp. 331-332. ISBN 3-528-05709-2, 978-3-322-89817-3 (online).

Büschkes, Roland and Kesdogan, Dogan (1999) Privacy Enhanced Intrusion Detection. In: Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München. ISBN 3-8273-1360-0.

Kesdogan, Dogan and Büschkes, Roland and Spaniol, Otto (1999) Stop-And-Go-MIXes Providing Pro-babilistic Anonymity in an Open System. In: Multilateral security in communications : [basis of the International Conference on Multilateral Security in Communications, to be held on the 16th and 17th of July 1999 in Stuttgart]. Vol. 3. Addison-Wesley, München. ISBN 3-8273-1360-0.

Kesdogan, Dogan and Trofimov, A. and Trossen, D. (1999) Strategies for Minimizing the Average Cost of Paging on the Air Interface. In: Kommunikation in Verteilten Systemen (KiVS): 11. ITG/GI-Fachtagung. Darmstadt, 2.-5. März 1999. Springer, Berlin, pp. 488-499. ISBN 978-3-540-65597-8, 978-3-642-60111-8 (online).

Büschkes, Roland and Borning, Mark and Kesdogan, Dogan (1999) Transaction-based Anomaly Detection. In: 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA. Prodeedings. www.usenix.org, pp. 129-134.

Kesdogan, Dogan and Reichl, Peter and Junghärtchen, Klaus (1998) Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks. In: Computer Security — ESORICS 98 : 5th Europ. Symp. on Research in Computer Security, Louvain-la-Neuve, Belgium, Sept. 16–18, 1998. Proceedings. Lecture Notes in Computer Science, 1485. Springer, Berlin, pp. 295-312. ISBN 978-3-540-65004-1, 978-3-540-49784-4 (online).

Büschkes, Roland and Kesdogan, Dogan and Reichl, Peter (1998) How to Increase Security in Mobile Networks by Anomaly Detection. In: 14th Annual Computer Security Applications Conference, Phoenix, AZ, 07-11 Dec 1998; Proceedings. IEEE, pp. 3-12. ISBN 0-8186-8789-4.

Reichl, Peter and Kesdogan, Dogan and Junghärtchen, Klaus and Schuba, Marko (1998) Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks. In: Computer Performance Evaluation. Modelling Techniques and Tools, 10th International Conference, Tools’98 Palma de Mallorca, Spain, September 14–18, 1998 Proceedings. Lecture Notes in Computer Science, 1469. Springer, Berlin, pp. 105-116. ISBN 978-3-540-64949-6, 978-3-540-68061-1 (online).

Kesdogan, Dogan and Egner, Jan and Büschkes, Roland (1998) Stop-And-Go-MIXes Providing Probabilistic Anonymity in an Open System. In: Information Hiding. 2nd Internat.l Workshop, IH’98, Portland, Oregon, USA, April 14–17, 1998. Proceedings. Lecture Notes in Computer Science, 1525. Springer, Berlin, pp. 83-98. ISBN 978-3-540-65386-8, 978-3-540-49380-8 (online).

Sailer, Reiner and Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas (1997) Allokation von Sicherheitsfunktionen in Telekommunikationsnetzen. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 325-357. ISBN 3-8273-1116-0; 3-8273-1355-4.

Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas and Spaniol, Otto (1997) Mobilkommunikation ohne Bewegungsprofile. In: Müller, Günter and Pfitzmann, Andreas, (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. 2 Bände. Reihe Informationssicherheit. Addison-Wesley-Longman, Bonn, pp. 169-180. ISBN 3-8273-1116-0; 3-8273-1355-4.

Kesdogan, Dogan and Zywiecki, Margarethe and Beulen, Klaus (1996) Mobile User Profile Generation - A Challenge between Performance and Security. In: Proc. of the 2nd Workshop on Personal Wireless Communications, Frankfurt a.M., Germany, 1Dec 10-11 1996 (IFIP TC 6). Univ., Frankfurt am Main, pp. 63-74.

Hoff, Simon and Jakobs, Kai and Kesdogan, Dogan (1996) Secure Location Management in UMTS, Communications and Multimedia Security. In: Communications and multimedia security II : Proc. of the IFIP TC6/TC11 Internat. Conf. on Communications and Multimedia Security, Essen, Germany, 23rd-24th Sept. 1996. Chapman &Hall, London. ISBN 0412797801.

Fasbender, Andreas and Kesdogan, Dogan and Kubitz, Olaf (1996) Variable and Scaleable Security Protection of Location Information in Mobile-IP. In: Mobile Technology for the Human Race. IEEE 46th Vehicular Technology Conference, Atlanta, GA, USA, 28 Apr 1996-01 May 1996. Vol. 2. IEEE, pp. 963-967. ISBN 0-7803-3157-5 .

Kesdogan, Dogan and Fouletier, Xavier (1995) Secure Location Information Management in Cellular Radio Systems. In: IEEE Wireless Communication System Symposium, New York, NY, USA, Nov. 1995. IEEE, pp. 35-40.

Conference or Workshop Item

Gulden, J. and Barth, T. and Karatas, Fatih and Kesdogan, Dogan (2012) Erhöhung der Sicherheit von Lebensmittelwarenketten durch Modell-getriebene Prozess-Implementierung. In: MKWI 2012, Teilkonferenz "Kommunikations- und Kooperationssysteme, Track "Digitale Netzwerke in unsicheren Umwelten", 29.2.-2.3.2012, Braunschweig. (Submitted)

Fischer, Lars and Kesdogan, Dogan and Dorfer, Laura (2011) Link Globally - Trust Locally. In: Federated Social Web Summit Europe 2011, June 3-5 2011, Berlin.

Ueberschär, Bernd and Schwittek, Widura and Eicker, Stefan and Bourimi, Mohamed and Heupel, Marcel and Kesdogan, Dogan (2011) Mobile applications for the angling community. In: 6th World Recreational Fishing Conference (WRFC), August, 1-4, 2011, Berlin, Humboldt-Univ..

Steinmann, S. and Mau, G. and Bourimi, Mohamed and Schramm-Klein, H. and Kesdogan, Dogan (2011) Tracking Shoppers Behavior At The Point Of Sale By Using End-Users Mobile Devices. In: 40. EMAC International Conference, New Technologies and E-Marketing Track, 24.-27.5.2011, Ljubljana, Slowenien.

Kesdogan, Dogan and Pham, Dang Vinh and Pimenidis, L. (2008) Analyse der Verkettbarkeit in nutzergesteuertem Identitätsmanagement. In: Sicherheit 2008: Tagung der Fachgruppe Sicherheit, Schutz und Zuverlässigkeit in der Gesellschaft für Informatik, 2.-4. April 2008, Saarbrücken, Schloss.

Pham, Vinh and Kesdogan, Dogan and Pimenidis, Lexi (2008) Information Disclosure in Identity Management. In: 13th Nordic Conference in Secure IT Systems, 09/10/08 → 10/10/08, Kongens Lyngby, Denmark.

Borning, Mark and Kesdogan, Dogan (2001) Privacy in E-Commerce. In: International Conference on Multimedia Internet, Video Technologies (MIV'01),World Scientific and Engineering Society (WSES), September 2-6 2001, Malta.

Büschkes, Roland and Haustein, Tobias and Kesdogan, Dogan (1999) Active Intrusion Detection - An Approach To Dynamic Risk Management. In: Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec’99), November 1999, Kista Science Park, Sweden.

Büschkes, Roland and Kesdogan, Dogan (1998) Intrusion Detection and User Privacy - A Natural Contradiction? In: International Symposium on Recent Advances in intrusion Detection 1998 (RAID 98), September 1998, Louvain-la-Neuve, Belgium.

Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas and Trossen, Dirk (1997) Minimizing the Average Cost of Paging on the Air Interface -- An Approach Considering Privacy. In: IEEE 47th Annual International Vehicular Technology Conference (VTC), 04. - 07. Mai 1997, Phoenix, Arizona.

Fasbender, Andreas and Kesdogan, Dogan and Kubitz, Olaf (1996) Analysis of Security and Privacy in Mobile-IP. In: Fourth International Conference on Telecommunication Systems 96, Modelling and Analysis, March 1996, Nashville, TN.

Kesdogan, Dogan and Federrath, Hannes and Jerichow, Anja and Pfitzmann, Andreas (1996) Location management strategies increasing privacy in mobile communication. In: IFIP SEC, International Information Security Conference; 12, 1996, Neon Karlobasion.

Kesdogan, Dogan (1995) Architectural Considerations Increasing Privacy in Mobile Communication Systems (short presentation). In: IFIP TC6/TC11 and Austrian Computer Society joint working Conference on Communications and Multimedia Security, Sept. 1995, Graz, Austria.

Federrath, Hannes and Jerichow, Anja and Kesdogan, Dogan and Pfitzmann, Andreas (1995) Security in Public Mobile Communication Networks. In: IFIP TC6 International Workshop on Personal Wireless Communications, 24. - 25. April 1995, Prag.

Book

Camenisch, Jan and Kesdogan, Dogan (2009) iNetSec 2009-Open Research Problems in Network Security. IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology, 309. Springer, Berlin. ISBN 978-3-642-05436-5 (Print), 978-3-642-05437-2 (Online).

Kesdogan, Dogan (2000) Privacy im Internet : vertrauenswürdige Kommunikation in offenen Umgebungen. Braunschweig, Vieweg. ISBN 3-528-05731-9.

Other

Bourimi, Mohamed and Heupel, Marcel and Kesdogan, Dogan and Fielenbach, Thomas (2011) Enhancing usability of privacy-respecting authentication and authorization in mobile social settings by using Idemix (in the context of the EU FP7 di.me Project). Univ. Siegen. (Submitted)

This list was generated on Tue Oct 21 10:45:47 2014 CEST.
  1. University

University Library

Publication Server

Contact person
Gernot Deinzer

Telefon 0941 943-2759
Contact